First Page | Meta Content | |
---|---|---|
![]() | Document Date: 2013-03-05 21:36:41Open Document File Size: 89,11 KBShare Result on FacebookCitySan Francisco / Tokyo / Berlin / Seoul / /CompanyIBM / Elsevier Science B.V. / CRC Press / HP Labs / /CountryJapan / Australia / United Kingdom / South Korea / /Currencypence / / /FacilityInstitute of Industrial Science / National Institute of Standards and Technology / University of Washington / The Institute of Electrical / University of Tokyo / Standards Publication FIPS PUB / Monash University / /IndustryTermsecurity applications / private key encryption algorithm / electronic transaction protocols / polynomial time discrete log algorithm / elliptic curve / secure and authenticated communications / signcryption algorithm / decryption algorithms / public key solutions / light-weight secure electronic transaction protocol / unsigncryption algorithm / efficiency-critical applications / /OrganizationInstitute of Electrical / University of Washington / Institute of Electrical and Electronics Engineers / U.S. Department of Commerce / IEEE P1363 / Institute of Industrial Science / University of Tokyo / National Institute of Standards and Technology / Monash University / Melbourne / School of Computing and Information Technology / /PersonHideki Imai / Victor Miller / Takakazu Satoh / Nigel Smart / Neal Koblitz / Kiyomichi Araki / /PositionPrime Minister / Corresponding author / /ProvinceOrStatePennsylvania / /Technologycbt / Information Technology / smart card / ATM / private key / decryption algorithms / public key encryption / encryption / cryptography / log algorithm / electronic transaction protocols / public key / signcryption algorithm / unsigncryption algorithm / private key encryption algorithm / elliptic curve signature-then-encryption / light-weight secure electronic transaction protocol / elliptic curve ElGamal encryption / digital signature / /URLhttp /SocialTag |